APDL: an adaptive step size method for white-box adversarial attacks

被引:0
|
作者
Hu, Jiale [1 ,2 ]
Li, Xiang [1 ,2 ]
Liu, Changzheng [1 ,2 ]
Zhang, Ronghua [1 ,2 ]
Tang, Junwei [3 ]
Sun, Yi [1 ,2 ]
Wang, Yuedong [1 ,2 ]
机构
[1] Shihezi Univ, Coll Informat Sci & Technol, Shihezi 832003, Xinjiang, Peoples R China
[2] Xinjiang Prod & Construct Corps, Key Lab Computat Intelligence & Network Informat S, Shihezi, Peoples R China
[3] Wuhan Text Univ, Sch Comp Sci & Artificial Intelligence, Wuhan, Peoples R China
关键词
Adversarial attacks; Deep learning; Image classification; White-box attacks;
D O I
10.1007/s40747-024-01748-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent research has shown that deep learning models are vulnerable to adversarial attacks, including gradient attacks, which can lead to incorrect outputs. The existing gradient attack methods typically rely on repetitive multistep strategies to improve their attack success rates, resulting in longer training times and severe overfitting. To address these issues, we propose an adaptive perturbation-based gradient attack method with dual-loss optimization (APDL). This method adaptively adjusts the single-step perturbation magnitude based on an exponential distance function, thereby accelerating the convergence process. APDL achieves convergence in fewer than 10 iterations, outperforming the traditional nonadaptive methods and achieving a high attack success rate with fewer iterations. Furthermore, to increase the transferability of gradient attacks such as APDL across different models and reduce the effects of overfitting on the training model, we introduce a triple-differential logit fusion (TDLF) method grounded in knowledge distillation principles. This approach mitigates the edge effects associated with gradient attacks by adjusting the hardness and softness of labels. Experiments conducted on ImageNet-compatible datasets demonstrate that APDL is significantly faster than the commonly used nonadaptive methods, whereas the TDLF method exhibits strong transferability.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] A white-box masking scheme resisting computational and algebraic attacks
    Seker, Okan
    Eisenbarth, Thomas
    Liśkiewicz, Maciej
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02): : 61 - 105
  • [22] Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks
    Alrawashdeh, Khaled
    Goldsmith, Stephen
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), 2021, : 294 - 301
  • [23] White-box content camouflage attacks against deep learning
    Chen, Tianrong
    Ling, Jie
    Sun, Yuping
    COMPUTERS & SECURITY, 2022, 117
  • [24] Study on White-Box Cryptography: Key Whitening and Entropy Attacks
    Bhatia, Kratika
    Som, Subhranil
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 323 - 327
  • [25] White-Box Multi-Objective Adversarial Attack on Dialogue Generation
    Li, Yufei
    Li, Zexin
    Gao, Yingfan
    Liu, Cong
    PROCEEDINGS OF THE 61ST ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, VOL 1, 2023, : 1778 - 1792
  • [26] STEWART: STacking Ensemble for White-Box AdversaRial Attacks Towards more resilient data-driven predictive maintenance
    Gungor, Onat
    Rosing, Tajana
    Aksanli, Baris
    COMPUTERS IN INDUSTRY, 2022, 140
  • [27] White-Box Cryptography: Don't Forget About Grey-Box Attacks
    Bock, Estuardo Alpirez
    Bos, Joppe W.
    Brzuska, Chris
    Hubain, Charles
    Michiels, Wil
    Mune, Cristofaro
    Gonzalez, Eloi Sanfelix
    Teuwen, Philippe
    Treff, Alexander
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1095 - 1143
  • [28] White-Box Cryptography: Don’t Forget About Grey-Box Attacks
    Estuardo Alpirez Bock
    Joppe W. Bos
    Chris Brzuska
    Charles Hubain
    Wil Michiels
    Cristofaro Mune
    Eloi Sanfelix Gonzalez
    Philippe Teuwen
    Alexander Treff
    Journal of Cryptology, 2019, 32 : 1095 - 1143
  • [29] Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning
    Zhang, Yinghua
    Song, Yangqiu
    Liang, Jian
    Bai, Kun
    Yang, Qiang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2989 - 2997
  • [30] Defeating state-of-the-art white-box countermeasures with advanced gray-box attacks
    Goubin L.
    Rivain M.
    Wang J.
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020, 3 (454-482): : 454 - 482